CVE-2022-2398 – WP Comments Fields < 4.1 - Admin+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2022-2398
The WordPress Comments Fields WordPress plugin before 4.1 does not escape Field Error Message, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed El plugin Comments Fields de WordPress versiones anteriores a 4.1, no escapa del mensaje de error de campo, lo que podría permitir a usuarios con altos privilegios llevar a cabo ataques de tipo Cross-Site Scripting incluso cuando la capacidad unfiltered_html está desautorizada The WordPress Comments Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Error Message setting in versions up to, and including, 4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. • https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-25018 – PPOM for WooCommerce < 24.0 - Subscriber+ Settings Update to Stored XSS
https://notcve.org/view.php?id=CVE-2021-25018
The PPOM for WooCommerce WordPress plugin before 24.0 does not have authorisation and CSRF checks in the ppom_settings_panel_action AJAX action, allowing any authenticated to call it and set arbitrary settings. Furthermore, due to the lack of sanitisation and escaping, it could lead to Stored XSS issues El plugin PPOM for WooCommerce de WordPress versiones anteriores a 24.0, no presenta comprobaciones de autorización y CSRF en la acción AJAX ppom_settings_panel_action, permitiendo a cualquier autenticado llamarla y establecer configuraciones arbitrarias. Además, debido a una falta de saneo y escape, podría conllevar a problemas de tipo XSS Almacenado • https://wpscan.com/vulnerability/9e092aad-0b36-45a9-8987-8d904b34fbb2 • CWE-862: Missing Authorization •
CVE-2021-4351 – Frontend File Manager <= 18.2 - Unauthenticated Post Meta Change
https://notcve.org/view.php?id=CVE-2021-4351
The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Post Meta Change in versions up to, and including, 18.2. This is due to lacking authentication protections, capability checks, and sanitization, all on the wpfm_file_meta_update AJAX action. This makes it possible for unauthenticated attackers to change the meta data of certain posts and pages. • https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities https://www.wordfence.com/threat-intel/vulnerabilities/id/5539aa79-66ad-43fa-967c-2bec877061e0?source=cve • CWE-862: Missing Authorization •
CVE-2021-4356 – Frontend File Manager <= 18.2 - Unauthenticated Arbitrary File Download
https://notcve.org/view.php?id=CVE-2021-4356
The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Download in versions up to, and including, 18.2. This is due to lacking authentication protections, capability checks, and sanitization, all on the wpfm_file_meta_update AJAX action. This makes it possible for unauthenticated attackers to download arbitrary files on the site, potentially leading to site takeover. • https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2554359%40nmedia-user-file-uploader&new=2554359%40nmedia-user-file-uploader&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/79e2011c-5e4d-4d02-831f-6b4dcfcaa51e?source=cve • CWE-862: Missing Authorization •
CVE-2021-4365 – Frontend File Manager <= 18.2 - Unauthenticated Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2021-4365
The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in versions up to, and including, 18.2. This is due to lacking authentication protections and santisation all on the wpfm_edit_file_title_desc AJAX action. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2554359%40nmedia-user-file-uploader&new=2554359%40nmedia-user-file-uploader&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c82154-d390-44ba-a54a-89f4bb69cdce?source=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •